Skip to content

Instantly share code, notes, and snippets.

View aw-junaid's full-sized avatar
🐞
finding bugs.

Abdul Wahab Junaid aw-junaid

🐞
finding bugs.
View GitHub Profile
@aw-junaid
aw-junaid / Web-Security.md
Created March 14, 2026 20:58
This is a comprehensive technical guide on the OWASP Top 10 2026 vulnerabilities, detailing their mechanisms and demonstrating how to identify, exploit, and report them using only Burp Suite and its plugins. This guide is designed for security professionals, penetration testers, and developers who have a basic understanding of web technologies a…

Comprehensive Guide to Layer 2 Security Testing: From Theory to Bug Bounty Practice

Introduction

Layer 2 (Data Link Layer) security is often overlooked in penetration testing, yet it forms the foundation of network infrastructure security. This comprehensive guide bridges the gap between theoretical knowledge and practical application, focusing on how to approach Layer 2 security testing in authorized environments.

Conducting a Layer 2 security test for a specific domain like domain.tech presents a unique challenge. Unlike a web application, layer 2 (the Data Link Layer) is confined to the local network segment. This means you cannot directly test the switches or internal network infrastructure of domain.tech from the internet.

However, if your bug bounty scope explicitly includes testing the local network (for example, if you are on-site, or if the company provides VPN access that places you inside their network), the checklist you provided becomes highly relevant. In such a scenario, you would

Web CTF Cheatsheet - Comprehensive Explanation

This document provides a detailed explanation of all web security concepts, techniques, and commands commonly used in Capture The Flag (CTF) competitions. Each section breaks down the underlying principles, why certain attacks work, and how to apply them in real scenarios.


Table of Contents

  1. Webshells
  2. Reverse Shells
@aw-junaid
aw-junaid / Web Penetration Testing Cheat Sheet.md
Last active March 5, 2026 12:41
Web penetration testing is the practice of simulating cyberattacks against web applications to identify security vulnerabilities before malicious actors can exploit them. This comprehensive guide covers everything from initial reconnaissance to post-exploitation and reporting. Whether you're preparing for certifications like OSCP, CEH, or GWAPT,…
@aw-junaid
aw-junaid / Computer Organization.md
Created February 28, 2026 20:06
Computer organization and architecture form the foundational blueprint that defines how computer systems are designed, constructed, and operated. This field encompasses the study of the internal workings, structural components, and operational methodologies that enable computers to process information, execute programs, and communicate with exte…

Computer Organization and Architecture – From Fundamentals to Advanced System Design


PART I — Foundations of Computer Systems

Chapter 1: Introduction to Computer Organization and Architecture

1.1 Definition and Scope

@aw-junaid
aw-junaid / Computer Networking.md
Created February 28, 2026 19:45
The journey of computer networks represents one of the most transformative technological revolutions in human history. Understanding this evolution provides crucial context for appreciating modern networking infrastructure and anticipating future developments.

Computer Networking and Data Communication – Complete Professional Reference

VOLUME I – FOUNDATIONS OF DATA COMMUNICATION

Chapter 1 – Introduction to Computer Networks

1.1 Evolution of Computer Networks

Algorithms and Data Structures

A Comprehensive Professional Reference


PART I — Foundations of Algorithms

Chapter 1: Introduction to Algorithms

@aw-junaid
aw-junaid / Assembly Language.md
Created February 28, 2026 12:59
The evolution of computing systems represents one of humanity's most remarkable technological journeys. From mechanical calculating devices to modern quantum computers, this history provides essential context for understanding why assembly language programming remains relevant today.

Advanced Assembly Language Programming & Computer Architecture

From Fundamentals to Reverse Engineering and Systems Development


PART I — Foundations of Computer Systems

Chapter 1: Introduction to Computer Architecture

MODERN CRYPTOGRAPHY: THEORY, ALGORITHMS, PROTOCOLS, AND PRACTICE

Foundations, Post-Quantum Security, Blockchain, Secure Systems & Applied Cryptanalysis

PART I — FOUNDATIONS OF CRYPTOGRAPHY


CHAPTER 1: INTRODUCTION TO CRYPTOGRAPHY

@aw-junaid
aw-junaid / Computer Circuits.md
Created February 28, 2026 11:37
The history of computing hardware is a testament to human ingenuity and our relentless pursuit of faster, more efficient information processing. From the mechanical calculators of the 17th century to today's multi-billion transistor processors, the evolution has been nothing short of extraordinary.

Advanced Computer Circuits & Architecture

From Semiconductor Devices to CPU, GPU & NPU Systems

VOLUME I — Semiconductor Foundations & Digital Circuit Design

PART I — Semiconductor Physics & Electronic Foundations

Chapter 1: Introduction to Modern Computing Hardware